Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Why insider threats pose unique risks to national security

By Marc Packler
insider-threats-freepik1170x658v.jpg

Image by monsterstudio via Freepik

June 29, 2022

Insiders have always posed a unique threat to national security. From Benedict Arnold’s treacherous turn to Robert Hanson’s dramatic betrayal, America’s own have caused grievous damage to the nation. The evolution of the internet, the relative ease of transferring data and the ability to send/receive anonymous money transfers have opened new holes in America’s defenses, dramatically increasing the risk of insider attacks. America needs to adapt current policies to combat the growing insider threat to critical networks.

The modern internet has become socialized. Online social networking is changing the way people view their relationships. Sites like TikTok, Facebook, LinkedIn, Nextdoor and Twitter allow individuals to escape into a virtual world. For some, online relationships become more important than physical ones and virtual personas become more significant than reality. Online communication allows people around the globe to interact and bond in a new way, creating friendships and forming alliances. For example, TikTok, a popular video platform where users create short videos for likes and interactions, boasts over 1 billion monthly active users. Due to the anonymity that a person can assume, these hidden relationships could be easily exploited to provide incentives for insiders to attack network systems and exfiltrate data including that which is essential to our national defense. Additionally, in a world where people live online as much as they do in the physical world, allegiance to a country, company, political affiliation or cause may diminish over time due to the pressure and influences they see on a daily basis based on their multiple social networking feeds.                               

Virtual worlds, with their own systems of law and working economies, provide new means to reward insiders willing to pass sensitive information. In 2021, Metaverse’s revenue was over $117 billion. That’s more than the annual GDP of the state of Arkansas. With currency exchange and facilitated peer-to-peer transactions, the anonymous aspects of virtual gaming dramatically multiply the possibilities for anyone seeking to covertly transfer money. It is easier today for insiders to transfer large amounts of information than ever before. The data tools available to insiders are incredibly widespread and have all sorts of completely legal and legitimate uses for everyday life. Exchanging information through Direct Messages (DMs) or in virtual worlds is now commonplace. This presents a huge problem — it is difficult to determine what information is being transmitted, and there are very few methods to monitor or control the communications flowing through these environments.

Although the government is already working hard to protect its networks from outsiders, as seen in the Insider Threat bill passed by the House in 2015, it is essential to realize the scope of the insider threat. Insiders can cause extensive damage to national security and are difficult to detect because, by nature, they have trusted access to vital information. We must update and adapt current practices to prevent at-risk applicants from gaining access to vital information and limit the possibility of current employees attacking the system.

Most routine security background checks today do not take into account an individual’s extensive cyber activity. Most applicants would not even think to list online screen names as aliases or online friends as personal references. However, a person may have more friends in an online neighborhood than they have in their own local community. Contact with foreign nationals, another part of the background check process, is also less clear with regards to online conversations. There is no easy way to tell if you’re conversing with a person across the street or halfway around the world. Investigators will also need the right tools and authority to follow up and validate cyber information within the background process. It is vitally important to update the background check process to sufficiently include both the physical and virtual worlds.

Developing new technology and radically changing policies is not the best way to defend current vulnerabilities. Policies and procedures need to be carefully tweaked and strongly implemented. Administrators and security need to utilize the tools currently employed to monitor the health of the network and ensure access only to areas required for work. Improved awareness through training and exercises will allow for better preparation of security and network managers to counter evolving vulnerabilities. Proper personnel oversight is key to any successful threat-prevention program. Since technology can’t identify which employees are potential insider threats, supervisors must take an active interest in the lives of their subordinates. Historically, common characteristics of insiders are those with a drastic downturn in their life, such as financial, work or family issues. Interpersonal signals are the best indicators of a potential insider threat, which technology cannot detect.

The cyber environment is changing society in ways that have a significant impact on national security. Even events such as elections pose a strong chance for the possibility of insider threats. Increased online activity presents both new reasons and easier means to betray one’s country or employer. The U.S. government and companies must adapt to actively defend and thwart the evolving insider threat.

KEYWORDS: background check cyber security risk management social media threat management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Marc packler

Pioneering, innovative, highly accomplished, and decorated, Marc Packler leverages an immense and diverse skillset – derived over the course of his 25+ year career in the United States Air Force – to positively impact digital security, digital transformation, risk management, and strategic operations within organizations across a vast array of industries. Marc is a widely acknowledged subject matter expert and public speaker on matters of digital protection and risk management. Marc can be reached on the Silent Quadrant website, LinkedIn or email marc@silentquadrant.com. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Small business store fronts

    Protect small businesses: Addressing security threats and insider risks

    See More
  • digital workplace

    Insider Threats Pose Biggest Security Risk, Bettercloud Report Reveals

    See More
  • Office supplies

    Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing